An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients. References: https://gitee.com/anolis/cloud-kernel/commit/bed537da691b https://bugzilla.openanolis.cn/show_bug.cgi?id=61 https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing@gmail.com/ https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2091705]
This was fixed for Fedora years ago in the 4.20 kernel rebases.
RHEL 8 based products are not marked as affected, this was fixed in 8.4 and this flaw doesn't qualify for z stream inclusion.